Current-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Killing a zombie process?
Still trying to track this down....
A modified version of ps(1) shows that the process state is clearly
LSZOMB and not LSDEAD. Furthermore, "ps -s" doesn't show any LWP for
the zombie process, so it would seem that process clean up has
progressed relatively far.
I was able to use "ps axl -O paddr" to get the address of the process's
struct proc, but I don't seem to be able to examine it with gdb.
# ps axl -O paddr | grep Z
UID PID PADDR PPID CPU PRI NI VSZ RSS WCHAN STAT TTY TIME COMMAND
1000 25032 fffffe810f45ea40 2214 0 43 0 2240 48 - R+ pts/1 0:00.00 grep Z
0 21120 fffffe81f578ba70 1 0 0 0 0 0 - Z pts/2 0:00.00 (sh)
# gdb /dev/mem
GNU gdb (GDB) 7.9.1
...
This GDB was configured as "x86_64--netbsd".
...
(gdb) symbol-file /netbsd.gdb
Reading symbols from /netbsd.gdb...done.
(gdb) print (struct proc *) 0xfffffe81f578ba70
warning: value truncated
$1 = (struct proc *) 0xfffffe81f578ba70
(gdb)
Any clue on how to properly access kernel memory here, without having
the address truncated to 32-bits?
TIA
+------------------+--------------------------+-------------------------+
| Paul Goyette | PGP Key fingerprint: | E-mail addresses: |
| (Retired) | FA29 0E3B 35AF E8AE 6651 | paul at whooppee.com |
| Kernel Developer | 0786 F758 55DE 53BA 7731 | pgoyette at netbsd.org |
+------------------+--------------------------+-------------------------+
Home |
Main Index |
Thread Index |
Old Index